A summary on entropy statistics
María Dolores Esteban, Domingo Morales (1995)
Kybernetika
Anna Fabijańska (2012)
International Journal of Applied Mathematics and Computer Science
In this paper the problem of accurate edge detection in images of heat-emitting specimens of metals is discussed. The images are provided by the computerized system for high temperature measurements of surface properties of metals and alloys. Subpixel edge detection is applied in the system considered in order to improve the accuracy of surface tension determination. A reconstructive method for subpixel edge detection is introduced. The method uses a Gaussian function in order to reconstruct the...
Aldo de Luca, Antonio Restivo (1981)
Semigroup forum
Vinícius G. P. de SÁ, Davidson R. Boccardo, Luiz Fernando Rust, Raphael C. S. Machado (2013)
RAIRO - Theoretical Informatics and Applications - Informatique Théorique et Applications
A Message Authentication Code (MAC) is a function that takes a message and a key as parameters and outputs an authentication of the message. MAC are used to guarantee the legitimacy of messages exchanged through a network, since generating a correct authentication requires the knowledge of the key defined secretly by trusted parties. However, an attacker with access to a sufficiently large number of message/authentication pairs may use a brute force algorithm to infer the secret key: from a set...
Didier Auroux, Lamia Jaafar Belaid, Mohamed Masmoudi (2007)
ESAIM: Mathematical Modelling and Numerical Analysis
The aim of this article is to propose a new method for the grey-level image classification problem. We first present the classical variational approach without and with a regularization term in order to smooth the contours of the classified image. Then we present the general topological asymptotic analysis, and we finally introduce its application to the grey-level image classification problem.
Landi, Germana, Piccolomini, Elena Loli, Zama, Fabiana (2008)
Computational & Mathematical Methods in Medicine
Lindner, A.M. (2000)
Zeitschrift für Analysis und ihre Anwendungen
Andrea Braides, Giuseppe Riey (2008)
ESAIM: Mathematical Modelling and Numerical Analysis
We propose a model for segmentation problems involving an energy concentrated on the vertices of an unknown polyhedral set, where the contours of the images to be recovered have preferred directions and focal points. We prove that such an energy is obtained as a Γ-limit of functionals defined on sets with smooth boundary that involve curvature terms of the boundary. The minimizers of the limit functional are polygons with edges either parallel to some prescribed directions or pointing to some fixed...
Ivan Nagy, Miroslav Kárný (1992)
Kybernetika
Igor Vajda (1989)
Kybernetika
Victor Peña-Macias (2023)
Kybernetika
Determining information ratios of access structures is an important problem in secret sharing. Information inequalities and linear rank inequalities play an important role for proving bounds on these ratios. Characteristic-dependent linear rank inequalities are rank inequalities which are true over vector spaces with specific field characteristic. In this paper, using ideas of secret sharing, we show a theorem that produces characteristic-dependent linear rank inequalities. These inequalities are...
Niels K. Poulsen, Henrik Niemann (2008)
International Journal of Applied Mathematics and Computer Science
The focus of this paper is on stochastic change detection applied in connection with active fault diagnosis (AFD). An auxiliary input signal is applied in AFD. This signal injection in the system will in general allow us to obtain a fast change detection/isolation by considering the output or an error output from the system. The classical cumulative sum (CUSUM) test will be modified with respect to the AFD approach applied. The CUSUM method will be altered such that it will be able to detect a change...
Zheng, Wei Xing (2001)
Mathematical Problems in Engineering
Jaroslav Maršík (1967)
Kybernetika
Yang, Yu-Qian, Zhang, Jiang-She, Huang, Xing-Fang (2010)
Mathematical Problems in Engineering
Magalie Fromont, Céline Lévy-leduc (2006)
ESAIM: Probability and Statistics
Initially motivated by a practical issue in target detection via laser vibrometry, we are interested in the problem of periodic signal detection in a Gaussian fixed design regression framework. Assuming that the signal belongs to some periodic Sobolev ball and that the variance of the noise is known, we first consider the problem from a minimax point of view: we evaluate the so-called minimax separation rate which corresponds to the minimal l2-distance between the signal and zero so that the detection...
Chesneau, Christophe (2011)
International Journal of Mathematics and Mathematical Sciences
B. Forte, R. Gupta (1985)
Aequationes mathematicae
Jean-Yves Audibert (2004)
Annales de l'I.H.P. Probabilités et statistiques
Hiroyuki Okazaki (2015)
Formalized Mathematics
In this article we formalize negligible functions that play an essential role in cryptology [10], [2]. Generally, a cryptosystem is secure if the probability of succeeding any attacks against the cryptosystem is negligible. First, we formalize the algebra of polynomially bounded sequences [20]. Next, we formalize negligible functions and prove the set of negligible functions is a subset of the algebra of polynomially bounded sequences. Moreover, we then introduce equivalence relation between polynomially...